• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Security Announcements at AWS re:Invent 2022 | by Teri Radichel | Cloud Security | Dec, 2022

flyytech by flyytech
December 2, 2022
Home Security
Share on FacebookShare on Twitter


Some thoughts on security announcements to date at AWS re:Invent

More posts on AWS Security

Watching Werner Vogel’s Keynote

In this post I’m just compiling some of the security announcements at AWS re:Invent. I’ll have to go back and take a look at them more in detail later as, unfortunately and fortunately, someone hired me to teach a class during re:Invent.

Not sure when I will get out to speak at a large conference again but I try to keep tabs on what people are talking about based on the information I find online. These days I tend to prioritize what drives business and makes money to be honest, as I’m traveling less. But I miss seeing friends at re:Invent very much!

Here’s my initial reaction to the announcements but again, without all the details and it is a woman’s prerogative to change her mind. 🙂

VPN-less Secure Network Access to Corporate Applications

Many solutions are taking different approaches to remote access. There are a lot of solutions trying to connect people at the application layer, rather than the network layer in the OSI model. Some are interesting, others not so much. Without diving into the solution here is what you want to ask:

  • If someone obtains your credentials or an active session, can they use it from an alternate network location to get to the host where you ultimately are logged into and working? If so, it is an identity solution, not a network solution.
  • Does the encryption used to connect to the remote host encrypt all network traffic to the remote host or only traffic on a particular protocol? As I’ve written about before some VPNs are better than others in that regard (SSL vs. IPSEC).
  • Does the solution allow you to inspect all network traffic — accepted, rejected, or failed — on all ports between the remote host and the target endpoint?
  • Can you see full packets? Some attacks below the application layer in the OSI Model may not be visible if you can’t see all those network packet details as I have explained in other posts.
  • When someone connects to the remote endpoint, is that remote endpoint accessible via the Internet to others? When you connect to a VPN, the VPN endpoint is exposed, but no hosts within the network if you are not connected to the VPN. I once performed a penetration test where one of the objectives was to see if the bastion host was vulnerable. I essentially reverse engineered the fact that the bastion host was behind a VPN so the only way it would be vulnerable is if I could first break through the VPN. That’s what a VPN does for you. When hosts are exposed directly to the Internet with no layer between they are open to direct attack from the Internet.
  • Can you manage all the access from one point or do you have to manage each and every host exposed to the Internet for remote access individually? If you cannot manage them centrally then you’ve exponentially increased management and risk. Errors and misconfigurations represented 13% of security incidents on the 2022 Verizon Data Breach Report so you want to reduce the chance of misconfiguration by reducing what you have to manage. A VPN does that (and so does the automation I wrote about here for per-user instances that use a single script for deployment to a certain extent — there are pros and cons to that approach vs. VPN but better than exposing every host to the Internet). I presume this new service is a centralized solution but I haven’t looked into it.

If this new solution meets all of the above criteria then it may be a VPN replacement. Most of the time when companies advertise a solution as a VPN replacement they aren’t really, but maybe Amazon has cracked that nut with this new service.

In terms of the new application-based security approaches one interesting thing about them is that when someone connects to an application, they can’t “scan the network” in the traditional sense with a tool like nmap. I haven’t inspected this yet to see if it is that type of solution or something else.

VPC Lattice

This looks very interesting if it can help to set up a zero-trust network for service to service communication. I’ve been writing about serverless networking in my latest blog series on automating cybersecurity metrics and this service may help. I’ll have to check it out. For people who are just getting started building applications , serverless is easier than all the configuration you need to do to set up Kubernetes or even EC2. The related networking, not so much. Maybe this will help.

Again, you’ll want to verify that it meets the same network requirements as the VPN above to determine if it is truly a network solution, or an identity solution.

AWS KMS External Key Store

This service looks great for organizations that need to host keys on premises but want to integrate with KMS. Sometimes customers want to control their own key or they need the key to be accessible in a private network and on AWS (though I wouldn’t be too excited about latency potentially in that case). This may help some larger organizations with compliance restrictions or high-security needs.

AWS Inspector — Lambda Vulnerability Scanning

Awesome. You’ll need to take a look at the particular programming languages and vulnerabilities it finds but this is great news! I’ll definitely be trying it out.

Automated Data Discovery for Macie

Macie wants to help you find where automated data exists where you might not be aware in S3 buckets. As with data exfiltration tools I presume it will need to be monitored and tuned for false positives. Data exfiltration and identifying sensitive data is always challenging. I often have Burp identifying random strings as credit cards, for example, on penetration tests that are not really credit cards. Be prepared to invest the resources to manage this tool but it should be able to help you find your sensitive data and lock it down.

Amazon Verified Permissions

Amazon calls this new feature:

a scalable, fine-grained permissions management and authorization service for custom applications

If it’s what I think it is I once wrote something like this. We had a central automation service that read in configuration files and allowed or disallowed actions based on configuration files written by developers. The developers didn’t have to write the code to authorize actions but rather define the allowed actions for a particular user type.

It also sounds similar to Open Policy Agent (OPA) which came out later and is a concept I really like. I’ll have to try it out to see if it is what it sounds like.

Automated in-AWS Failback for AWS Elastic Disaster Recovery

This new feature looks interesting. Will have to see if it helps with Ransomware.

Backup for CloudFormation Stacks

This also looks pretty interesting. Looking forward to trying it out.

Redshift Backup

Helpful for those using Redshift to restore when needed.

New — Failover Controls for Amazon S3 Multi-Region Access Points

Another service to check out and test for those creating automated failover in case of an AWS outage or security incident. When S3 has issues, many applications have issues. Failover with S3 can be challenging. Hopefully this makes it easier.

Amazon Security Lake

Storing data using the OCSF standard. This is definitely something for security folks to check out who have to deal with the all the security logs in an organization. If you get in on the preview, you may be able to provide valuable feedback to help drive changes in the right direction to meet your needs.

Config Rules — Proactive Compliance

Proactive is better than reactive. This is definitely worth checking out. In an envirment where I worked, a network compliance tool would revert a non-compliant change within three minutes. And that was all the time someone — on the security team — needed to open up access to his instance and make a configuration change he needed. When I confronted him about it it he said it was a “dumb tool.” It wasn’t, but it shows the need need to prevent the change if possible, rather than react after it’s too late.

Control Tower — Comprehensive Controls Management

Control Tower is such a needed service but as I’ve written before some things are a bit challenging when you try to use and maintain it. But the concept is on point and I’m excited to check this out.

Amazon EventBridge Pipes

This is not exactly a security feature but it if it helps improve consistency and reduce complexity through abstraction it may help the overall security at an organization when connecting services in an asynchrous manner.

Wickr — End to End encryption for communication services

There it is! I was just looking for more information on end-to-end encryption in my last blog post on Amazon Chime. It is not clear that the communication is actually encrypted end to end based on the documentation. I’m not sure if Amazon Chime uses this service or is end-to-end encrypted or not based on what I found but if you need to be this service may help because it clearly is.

New — Amazon ECS Service Connect Enabling Easy Communication Between Microservices

This service sounds similar to Lattice (above) but for ECS.

CloudWatch Logs Data Protection

Appears to detect sensitive data in logs. Definitely worth a look.

CloudWatch Cross-Account Observability

I wrote about some issues with cross-account logging for KMS. I think this is going to be a very, very useful feature and hope to try it out and possibly blog about it later in my latest blog series where I’m building out a cloud security architecture for batch jobs (and really anything else).

Container Runtime Threat Detection in Guard Duty

This was announced in the AWS keynote by Adam Selipsky. Not seeing it yet in the AWS news announcements but I found this post from November.

I wrote about that and some other security related features here after watching the AWS keynote.

I might have missed something and there’s a bit more to go at AWS re:Invent. I’ll update this post if I see anything new.

Follow for updates.

Teri Radichel

If you liked this story please clap and follow:

******************************************************************

Medium: Teri Radichel or Email List: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests services via LinkedIn: Teri Radichel or IANS Research

******************************************************************

© 2nd Sight Lab 2022

____________________________________________

Author:

Cybersecurity for Executives in the Age of Cloud on Amazon

Need Cloud Security Training? 2nd Sight Lab Cloud Security Training

Is your cloud secure? Hire 2nd Sight Lab for a penetration test or security assessment.

Have a Cybersecurity or Cloud Security Question? Ask Teri Radichel by scheduling a call with IANS Research.

Cybersecurity & Cloud Security Resources by Teri Radichel: Cybersecurity and Cloud security classes, articles, white papers, presentations, and podcasts





Source_link

flyytech

flyytech

Next Post
Rode announces the VideoMicro II Camera-Mount Shotgun Microphone

Rode announces the VideoMicro II Camera-Mount Shotgun Microphone

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

How To Fix REAPER Media Databases

How To Fix REAPER Media Databases

October 11, 2022
Moola Market Reveals $9m Crypto Exploit

Moola Market Reveals $9m Crypto Exploit

October 19, 2022

Trending.

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

January 14, 2023
Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Allen Parr’s false teaching examined. Why you should unfollow him.

Allen Parr’s false teaching examined. Why you should unfollow him.

September 24, 2022
Review: Zoom ZPC-1

Review: Zoom ZPC-1

January 28, 2023
How to View Ring Doorbell on a Roku TV

How to View Ring Doorbell on a Roku TV

December 20, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Top 5: Stephen Street

Top 5: Stephen Street

March 22, 2023
Azure WAF guided investigation Notebook using Microsoft Sentinel for automated false positive tuning | Azure Blog and Updates

Introducing GPT-4 in Azure OpenAI Service | Azure Blog and Updates

March 22, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT